Crypto

We conduct a deep computer forensic analysis to discover the root of the problem.
We analyze your computer systems for potential vulnerabilities and patch and secure them to protect your data.
We use state of the art Cryptography algorithms to secure your computer systems from data breaches.

Learn if 33 Technologies would be a fit for completing your project’s mission.

Contact us now!

info@33technologies.com

Previous Work performed under Client 1:

Assigned to support the ongoing development and integration of military Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) products. Work is focused on cutting edge technology in a fast-paced environment under customer mandated project deadlines.

  • Conducted research and development on several Cryptographic accelerators for Army’s PRD (Personal Recovery Device) contract. Efforts included a secure waveform implementation.
  • Implemented Sandia Lab’s custom encryption algorithm and AES 256 encryption in a C# custom application as part of the Army’s PRD project. Tool used Visual Studio 2015.
  • Collaborated with Sandia Labs engineers on Army’s PRD project’s custom secure waveform software security implementation.
  • Conducted analysis, design, specification, documentation, implementation and support of software solutions involving wired and wireless networking, cameras, remote sensors (radar, seismic, magnetic, acoustic, sonars, imaging systems (fixed, open and closed loop control of PTZ and multi-axis gimbal imager positioners), unmanned aerial and underwater systems, and Geo-location and tracking devices.
  • Updated, tested and maintained a C++ software GUI to include additional functionality for the customer on current DHS contract.
  • Software analysis, design, coding and test a Web Service infrastructure from an Army Research Lab XML Schema for the C# prototype JSAS and AMDWS Simulators which consisted of a Client/Server architecture using Visual Studio 2015.
  • Implemented XML Web Service C# architecture to transmit XML Counter Rocket, Artillery, Mortar (C-RAM) data over a TCP/HTTP client-server transmission. Used Web Services Description Language.
  • Implemented C# MVC (Model-View-Controller) design pattern and ASP.NET Web API to serialize model and write the serialized data into the body of the HTTP response message.
  • Implemented a C# Windows Service to host the AMDWS web service.
  • Implemented C# WCF JSAS and AMDWS SOAP XML Envelopes.
  • Tested Owl Cyber Defense and CUBIC Cross Domain Solutions with C# developed JSAS and AMDWS Simulator console applications for bidirectional Classified (high) to Unclassified (low) proof of concept capability.
  • Implemented C# WCF Web Service Message and Transport security.
  • Actively participated in requirements analysis, design reviews and code reviews.
  • Worked independently and collaborated effectively with the team.
  • Reviewed system documentation, test plans and procedures.

Previous Work performed under Client 2:

Assigned to the Department of Defense’s largest acquisition program, The F-35 Joint Strike Fighter (JSF) also called the Lighting II is being procured in different versions for the U.S. Air Force, Marine Corps, Navy, Allied Partners and FMS customers.

  • Provided Cryptographic support to U.S. Military Avionics F-35 teams via in person/phone & email.
  • Provided Cryptographic support to Partners and FMS Customers via their Country Director.
  • Provided Cryptographic support recommendations to the F-35 Weapons team via email.
  • Attended weekly End Cryptographic Units (ECUs) meetings and managed certification and accreditations via phone and email.
  • Communicated with NSA Management personnel to solve issues concerning all ECUs.
  • Hosted Cryptographic Working Group with Lockheed Martin Crypto team as an effort to keep all F-35 Crypto stakeholders involved with the latest developments and lessons learned.
  • Worked on Statement of Work (SOW), Bases of Estimates (BOEs) and future F-35 Crypto Modernization capabilities requirements.
  • Provided comments and assisted with the Key Management Plan and Crypto Support Plans.
  • Communicated effectively with EKMS Managers and COMSEC custodians to solve issues involving key material and provided the proper guidance.
  • Developed Concept of Operations (CONOPs) documentation to facilitate coordination of Ferry Key material to U.S. Air Force Bases.
  • Transitioned into a Systems Security Engineering Lead position.
  • Provided Technical review of the Certification and Accreditation for the Offboard Mission Support Software used in the F-35 Sites and foreign partners.
  • Transitioned into the Cross-Domain Support Element position which required coordination with the Services (Marine, Navy, and Air Force) Cross Domain Support Elements for the SABI certification of the Cross-Domain Solutions used in the F-35 Mission Systems Architecture.
  • Coordinated F-35 technical meetings with Chief Engineer at the NSA/UCDSMO.
  • Prepared and submitted monthly status reports and travel reports to Executive level management and JPO SSE leadership.

Previous Work performed under Client 3:

Assigned to the JASSM (Joint Air-to-Surface Standoff Missile) program.  JASSM is an autonomous, long-range, conventional, air-to-ground, precision standoff missile for the U.S. Air Force.  Designed to destroy high-value, well defended, fixed and re-locatable targets.  The JASSM is integrated on multiple aircraft including the B-1, B-2, B-52, F-16, F-15E, Australian F/A-18 and future integrations of F-35 Lightning II fighter aircraft.

  • Part of the Mission Planning software development team located inside a closed area.
  • Created requirements analysis, designing/developing Visual C++ and C# software.
  • Identified software bugs and suggested to enhance security on some of the software.
  • Involved in the software development peer review process and management meetings.

Previous Work performed under Client 4:

Assigned to the Information and Decision Systems Enterprise Software Dept.  Worked on an Android and Windows based mobile situational awareness product line.  The Mobile SA system will take data from a wide variety of radiation sensors, applies data fusion and analyses algorithms, shares data throughout the network of users and displays the data to the users in a smartphone or Tablet handheld application.  This product line is designed and developed for future use by DTRA (Defense Threat Reduction Agency) for nuclear detection, deterrence and defense.

  • Part of a software development team located at Draper Cambridge and Tampa locations.
  • Software analysis, design, coding and test, involving significant changes to the ATAK (Android Terminal Assault Kit) and WINTAK (Windows version of ATAK) to include the integration of radiation sensor detectors such as Nucsafe Backpack portable system, Ortec Gamma and Neutron detection system and a Northrop Grumman detection system.

Tools used: Eclipse, Java, Android ADT, Visual Studio 2012 for Desktop, Surface SDK, WPF development, C#, Samsung Galaxy Note smartphone and Samsung Slate Tablet.

Previous Work performed under Client 5:

Assigned to the Information Systems sector, part of the Defense Systems Division and supporting the Integrated Mission Systems Business Unit.

  • Software analysis, design, coding and test, involving small scope fixes and enhancements to the Northrop Grumman SMART.neXt (Secure Message and Routing, Next Generation) product line. Tools used: Eclipse and Java. NIST 800-53 security standards.
  • Involved in a Northrop Grumman Internal Research and Development (IR&D) program that includes software security, IDS (Intrusion detection systems), SCAP (Security Content Automation Protocol), System Vulnerability Management, DISA (Defense Information Systems Agency) STIGs (Security Technical Implementation Guides) and Cryptography.
  • Submitted an Innovation proposal to the Information Systems sector to develop Cyber Security tools that include penetration testing, vulnerability and zero-day attack prevention. The initial funding for this proposal will be 50k, with further increments if the project is fully funded by the Northrop Grumman Information Systems division innovation competition.
  • Implemented a customized PAM (Pluggable Authentication Module) for the Solaris OS.  The module will enforce the no more than 3 consecutive characters in a class rule using regular expressions and will enhance password security at the operating system level.  This same rule was integrated in the SMART.neXt product Java code.  This implementation is very important because it affects all the SMART.neXt product customers.  Tools used: Eclipse, Java and C languages.

Previous Work performed under Client 6:

Assigned to the Air Transport Systems Dept.  Worked on the Boeing KC-46 Tanker program and the 767 FedEx Retrofit program that consists of replacing older flight deck CRT’s with LCD displays with a new and better design.

  • Developed a Java GUI for debugging platform software. Tools used included Java AWT, Swing and Eclipse.
  • Developed a Python script with embedded SQL to parse large amounts of data and insert into a database. Tools used Pydev and Microsoft SQL Server 2008 Management Studio.
  • Developed a C# console application to check FlexLM license manager for license availability within the company and automatically schedule a job. Tools used included, Visual Studio 2010, HPC Pack 2008 R2 cluster server and Job Manager.
  • Designed a database for KC-46 Tanker data, this database will be used as a starting tool that will be used in other programs as well. People that will use the database include: Management, Systems Engineers, Electrical Engineers and Administrative Assistants. Tools included: Python, PostgreSQL.

Previous Work performed under Client 7:

Worked on the Information Assurance Network Software Team.  The team is working on a Cross Domain Solution Building Blocks (CDS-BB) research effort as a part of Rockwell Internal Research and Development (IR&D) program.  This solution will be integrated on aircraft and other products for the U.S. Air Force where all information coming through the private network will be classified as Secret, Top Secret and will be certified by the NSA (National Security Agency).

  • Peer reviewed the Audit Module code written in C/C++ by a Senior Software Engineer.
  • Peer reviewed a Software Test document written by a Software Engineer.
  • Made suggestions on how to fix some issues that were discovered on these reviews.
  • Added small code changes to internal testing tool written in the Java language.
  • Created Unit Test Cases in Python and integrated Protocol Adapter Module.

Previous Work performed under Client 8:

Assigned to the Commercial Systems Information Management Software Department as a part of the SEPP program.  The secure Gateway project consisted of creating a prototype low cost Smart Diode Module currently in development for the Airbus Airplane A-350 out of 3 COTS (Commercial off the shelf) Arcturus Networks Uc53017 modules.

  • Researched various Cryptographic libraries to implement in the project. OpenSSL was used to verify file signatures and certificates, encrypt and decrypt files using RSA.  SHA1 algorithm was used to create file hashes.  Existing Python code was used as a reference.
  • Coded and tested TPFT client/server in C to send data securely between Right Offload Engine, Secure Engine and Left offload Engine.
  • Compiled and tested software into binaries to load into Uc53017 embedded voice modules. Information Assurance was applied using SELinux MAC policies in all modules.  Elliptic Curve Crypto and Smart Card technology was left as future implementation work. Displayed our prototype to Commercial Systems Vice President and upper level Management.

Previous Work performed under Client 9:

Served on the Government Systems Test Engineering Dept.  Coded and integrated functional drivers and software applications using Visual Studio 2005 and C# for COTS and custom test equipment as part of the U.S. Department of Defense next generation radio communication system MIDS (Multifunctional Information Distribution System-JTRS (Joint Tactical Radio System) used by the U.S. Navy and Air Force and the Ground Mobile Radio (GMR) a software reprogrammable radio with multi-band and multi-mode capable that will be used by the U.S. Army and Marine Corps.

  • Part of a highly efficient and experienced software and hardware engineer team.
  • Developed a complex windows application that controlled a 2 MHz to 2 GHz radio transceiver and tested frequencies in transmit and receive mode and automated a user interface application with national instruments TestStand tool.
  • Developed a complex windows application that calibrated a Very Ultra High-Power Amplifier (VUPA) used for the Ground Mobile Radio. The automated application tested frequencies, acquired power measurements and was adapted to a user interface application with National Instruments TestStand tool.
  • Updated software used in U.S. Air Force F22 fighter aircraft radio communication system. Software was written in LabWindows/CVI environment.
  • Converted Visual Basic and C++ windows applications to C#.
  • Developed and integrated a driver interface used in part with the aeroflex SDX2000 distance measuring equipment, a transponder-based radio navigation technology that measures distance by timing the propagation delay of VHF or UHF radio signals and TACAN module.
  • Developed and integrated a driver interface that remotely controlled a gigatronics 8542C power meter.
  • Developed and integrated a driver interface that remotely controlled a Racal 1256 GPIB and Ethernet switching system used to switch between different instruments used on the test station.
  • Wrote manufacturing software documents for all drivers and windows applications.
  • Involved in the software release process, which included interacting with software quality engineer, creating executables, installing and configuring applications and creating software distribution kits.
  • Attended weekly team software status meetings to report progress on projects.
  • Worked well under pressure and overtime hours as necessary to meet milestones.

Previous Work performed under Client 10:

Assigned to the Milwaukee county behavioral health division MIS department. The department has an off the shelf system designed by Netsmart technologies.  The system is maintained and customized to the changing needs of the customer.  The system resides on a UNIX server with many different applications.

  • Analyzed functional design provided by systems analyst and applied the software development life cycle.
  • Coded in a Basic like programming language used mainly for the system.
  • Utilized different tools that helped with the development process.
  • Balanced work load and schedule to meet deadlines.
  • Suggested different approach to design and coding to make the system more efficient.
  • Worked with other programmers to become more productive as a team.

Previous Work performed under Client 11:

Worked on the Oklahoma Medicaid Management Information government system account.  The system’s application is divided into components so that they process on different networked computers, leveraging the true power of client/server architecture. Worked as part of a team that developed the O-EPIC Employer-Employee sponsored insurance online application for the state of Oklahoma. The front end was developed in Microsoft Studio .NET 2003, C# and the backend was developed in C with a connection to an oracle database.  Included embedded XML–XSL tags to properly display letter data sent to customers.  This large implementation went live on October 2006. Tools included: ASP.NET, JavaScript, and CSS.

  • Applied the systems life cycle methodology on all work assigned. The cycle consisted of the following phases: Define, Analyze, Design, Produce, Optimize, and Implement.
  • Proficient use of the C language, UNIX operating system and ORACLE SQL query manipulation on large amounts of data.
  • Utilized different tools that helped with the development process.
  • Worked under pressure and after work hours if necessary to meet deadlines.
  • Helped fellow team members with programming issues and resolved them together.
  • Communicated with Senior Systems Engineer and followed up on pending requirements.
  • Prioritized my time and I worked on multiple projects assigned.

 

33 Technologies is a technology consulting firm located in the Washington D.C. area serving Federal, Commercial and Non-Profit clients all over the nation.  We specialize in Crypto and Software Development, Cybersecurity, Android mobile device security including app development as well as Research and Development.  We have developed long-term relationships with the following Federal, Commercial and Non-Profit clients.

Federal
  • Lockheed Martin
  • Northrop Grumman
  • Rockwell Collins
Commercial
  • Accenture Technology Solutions
  • Hewlett Packard
Non-Profit
  • MIT-Draper Laboratory
Crypto Security or Software Development?

Let us know how we can help here